Facebook Deserves To Be Broken-Up

Facebook has been accused of "auto-generating" extremist content, including a celebratory jihadist video and a business page for al-Qaeda. The material was uncovered by an anonymous whistleblower who filed an official complaint to US regulators. Similar content for self-identified Nazis and white supremacist groups was also found online.

Facebook said it had got better at deleting extreme content but its systems were not perfect.

Content Creators

The whistleblower's study lasted five months and monitored pages of 3,000 people who liked or connected to organisations listed as terrorist groups by the US government. The study found that groups such as the Islamic State group and al-Qaeda were "openly" active on the social network.

In addition, it found that Facebook's own tools were automatically creating fresh content for the proscribed groups by producing "celebration" and "memories" videos when pages racked up enough views or "likes", or had been active for a certain number of months.

The local business page for al-Qaeda generated by Facebook's tools had 7,410 "likes" and gave the group "valuable data" it could use when recruiting people or seeking out supporters, the complaint said. On the local business page, Facebook's algorithms populated the page with job descriptions that users put in their profiles. It also copied images, branding and flags used by the group.

Similar content was automatically produced for white supremacist and Nazi groups active on Facebook.
The complaint has been filed with the US Securities and Exchange Commission, alleging Facebook has misled shareholders by claiming to remove extremist content while letting it persist on the site.

John Kostyack, director of the US National Whistleblower Centre, which released the study on behalf of the whistleblower, said he was "grateful" that the "disturbing information" had been released.

"We hope that SEC takes prompt action to impose meaningful sanctions on Facebook," he said in a statement.
In a statement, Facebook said: "After making heavy investments, we are detecting and removing terrorism content at a far higher success rate than even two years ago.

"We don't claim to find everything and we remain vigilant in our efforts against terrorist groups around the world."

The study is the latest in a series of mis-steps for Facebook, which has faced repeated criticism over the way it handles hate speech and extremist content.

Facebook co-founder Chris Hughes, said it is time to break up Facebook, which now has almost 3 billion users, in an editorial published in the New York Times.

84% of social media advertising goes to Facebook and it is now worth over half a Trillion dollars, which is the combined worth of over sixty-five countries in the world.  

"The government must hold Mark Zuckerberg accountable," he wrote.

“America was built on the idea that power should not be concentrated in any one person, because we are all fallible. That’s why the founders created a system of checks and balances. They didn’t need to foresee the rise of Facebook to understand the threat that gargantuan companies would pose to democracy.

New York Times:      BBC:   

You Might Also Read: 

AOC Gives Up On Facebook:


 

« Snowden Accuses CIA Of 'A PR Fix'
MS Word Uses An AI Editor To Improve Your Writing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Netsafe

Netsafe

Netsafe is an independent, non-profit New Zealand organisation focused on online safety. We help people stay safe online by providing online safety education, advice and support.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

InsightCyber

InsightCyber

InsightCyber is on a mission to keep the world’s critical infrastructure, supply chains, and manufacturing operations cyber-safe, helping to prevent attacks that can have catastrophic impacts.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.